Containers

Container concern over Linux flaw

Pro
Image: Stockfresh

22 February 2016

Countless patching efforts are now under way for the years-old bug recently discovered in the GNU C Library, but organisations that use container technology should not relax just yet.

“As patches are being delivered by Linux vendors and community distributions, there’s one glaring issue at play: who’s fixing containers?” wrote Red Hat’s Gunnar Hellekson, director of product management, and Josh Bressers, security strategist, in a blog post.

Red Hat and Google independently discovered the glibc buffer-overflow bug, which opened the door to attacker-controlled domain names, attacker-controlled DNS servers and man-in-the-middle attacks.

Container vendors have increasingly offered container scanners as a way to help identify issues like the one found in glibc, but those vendors “aren’t actually in control of the containers that their users are deploying, let alone the underlying operating system powering these container deployments,” Hellekson and Bressers wrote.

So, while vendors may offer the tools to help organisations find the problems, they may not have the expertise, capabilities or the ownership to actually fix the security bugs, the two added. As a result, businesses may be living under a false sense of security.

“In our view, container scanners are a paper tiger,” Hellekson and Bressers said. “Sure, they look fierce and they’ll roar to let you know that trouble’s on the way, but they fold like the paper that they’re made out of when you need them to do more than just … well … scan.”

Not surprisingly, Hellekson and Bressers went on to highlight Red Hat’s own certified container registry, tools for container scanning and container-security features and services.

Regardless of the vendors your company uses, though, it may be wise to check into the security state of your containers and make sure the glibc bug doesn’t live on.

 

IDG News Service

Read More:


Back to Top ↑

TechCentral.ie